Categories: CyberHoot

HowTo: Fix False Opens and Clicks in AttackPhish Reports

Why Does My AttackPhish Report Show Users Opening and Clicking Emails They Never Saw?

Overview

​If you’re seeing users listed as having opened and clicked phishing emails within seconds, or even before they could have possibly opened them, don’t worry. Your users aren’t lying, and nothing is broken. What you’re seeing is a byproduct of modern email security tools doing their job.

What’s Happening

Many email security solutions such as Microsoft

Sponsored
Defender for Office 365BarracudaMimecast, and Proofpoint include features like Safe LinksURL Protection, or Link Scanning.

When a simulated phishing email from CyberHoot’s AttackPhish module arrives, these systems automatically:

  1. Open the message in a secure sandbox to inspect its contents.
  2. “Click” every link in the email to verify it’s safe before delivering it to the user’s inbox.

These automated scans trigger the same tracking mechanisms CyberHoot uses to record legitimate user activity. The result is that your report may show:

  • The email was opened seconds after delivery.
  • A link was “clicked” within the same minute.
  • Multiple users showing identical timestamps.

Why This Happens

  • Automated link scanners mimic user clicks.
  • Security gateways follow embedded URLs to check for malicious redirects.
  • Tracking pixels are loaded during this process, falsely marking messages as opened.

In short, your security system (not your user) is the one “clicking.”

How to Fix It

To ensure your AttackPhish reports accurately reflect real user behavior, you’ll need to allow CyberHoot’s phishing simulations to pass through your email filters without sandbox inspection.

Follow the guide below for M365:

Sponsored

[Guide: HowTo – Allow-List by X-Header in Exchange 2013/2016 or Microsoft 365]

For the list of CyberHoot’s IP addresses and domain names needed to set up the allow-listing and to help you with other technologies, please check this page:

https://cyberhoot.com/howto/cyberhoots-email-ip-addresses-and-hostnames/

Summary

False “opens” and “clicks” in AttackPhish reports are almost always caused by link-scanning technologies doing what they’re designed to do: protect your users. Once CyberHoot’s domains or headers are allow-listed, you’ll see accurate results that reflect genuine user behavior.

The post HowTo: Fix False Opens and Clicks in AttackPhish Reports appeared first on CyberHoot.

rssfeeds-admin

Share
Published by
rssfeeds-admin

Recent Posts

WATCH LIVE: Sweetwater Rattlesnake Roundup Parade

(KTAB/KRBC) - The Sweetwater Rattlesnake Roundup Parade for 2026 is taking place at 4:30 p.m.,…

44 minutes ago

Grand Jury: Drug cases make up most of Taylor County indictments this week

Editor’s Note: A Grand Jury indicted the following suspects on felony charges in Taylor County,…

44 minutes ago

KRBC Anchor Abby Green on Loving Life in Abilene and the Note She Reads Every Morning

Abby Green, co-anchor of the KRBC nightly newscast, shares her journey from high school journalism…

44 minutes ago

Historic building engulfed in flames in Ranger

RANGER, Texas (KTAB/KRBC) - A historic building was engulfed in flames on Thursday morning. Crews…

44 minutes ago

Delivering meals & smiles: One Abilene woman’s life of service

ABILENE, Texas (KTAB/KRBC) - An Abilene woman delivers meals to those in need, but her…

44 minutes ago

11-year-old faces 1st-degree murder charge in death of 5-year-old brother

An 11-year-old boy is facing a first-degree murder charge in connection with the death of…

44 minutes ago

This website uses cookies.